, Opinion 05/2014 on Anonymisation Techniques, 2014.

, Opinion 2/2010 on online behavioral advertising, 2010.

, Opinion 16/2011 on EASA/IAB Best Practice Recommendation on Online Behavioural Advertising, 2011.

, Privacy Technology Focus Group: Final Report and Recommendations, 2006.

, Directive concerning the processing of personal data and the protection of privacy in the electronic communications sector, 2002.

D. Goodin, Poorly anonymized logs reveal NYC cab drivers' detailed whereabouts, ArsTechnica, pp.21-28, 2014.

T. Preston-werner and &. Gravatar, , 2007.

, Euclid Analytics -Privacy Statement, 2015.

G. Inc, Safe Browsing API, 2016.

D. Bongard, De-anonymizing Users of French Political Forums, 0xcite LLC, 2013.

, A Face Is Exposed for AOL Searcher No. 4417749, 2006.

, eyeQ Privacy Policy

, Mobile Location Analytics Code of Conduct, Future of Privacy Forum, 2013.

. Bpjm, BPJM Modul, Online, 2014.

P. Higgins and L. Tien, Mobile Tracking Code of Conduct Falls Short of Protecting Consumers, 2013.

A. Soltani, Privacy trade-offs in retail tracking | Federal Trade Commission, 2015.

J. Mayer, Questionable Crypto in Retail Analytics, 2014.

C. Bouchenard, JC Decaux's pedestrian tracking system blocked by French data regulator, 2015.

D. Koukis, S. Antonatos, D. Antoniades, E. P. Markatos, and P. Trimintzios, A generic anonymization framework for network traffic, Communications, 2006. ICC'06. IEEE International Conference on, vol.5, pp.2302-2309, 2006.

R. Chandra, R. Mahajan, V. Padmanabhan, and M. Zhang, CRAWDAD dataset microsoft/osdi2006 (v. 2007-05-23), p.pcap, 2007.

L. Demir, M. Cunche, and C. Lauradoux, Analysing the Privacy Policies of Wi-Fi Trackers, Proceedings of the 2014 Workshop on Physical Analytics, ser. WPA '14, pp.39-44, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00968585

T. Gerbet, A. Kumar, and C. Lauradoux, A Privacy Analysis of Google and Yandex Safe Browsing, 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01399829

A. J. Menezes, S. A. Vanstone, and P. C. Oorschot, Handbook of Applied Cryptography, 1996.

Q. Dang, Recommendation for Applications Using Approved Hash Algorithms, 2012.

, Secure Hash Standard (SHS), pp.180-184, 2012.

, SHA-3 Standard: Permutation-Based Hash and ExtendableOutput Functions, National Institute of Standards & Technology, Tech. Rep. FIPS PUB, vol.202, 2014.

M. J. Wiener, The full cost of cryptanalytic attacks, J. Cryptology, vol.17, issue.2, pp.105-124, 2004.

R. C. Merkle, One Way Hash Functions and DES, Advances in Cryptology -CRYPTO '89, 9th Annual International Cryptology Conference, pp.428-446, 1989.

I. Damgård, A Design Principle for Hash Functions, Advances in Cryptology -CRYPTO '89, 9th Annual International Cryptology Conference, pp.416-427, 1989.

B. Preneel, The State of Cryptographic Hash Functions, Lectures on Data Security, Modern Cryptology in Theory and Practice, vol.1561, pp.158-182, 1998.

, The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition, Topics in Cryptology -CT-RSA 2010, ser, vol.5985, pp.1-14, 2010.

, Information and Communications Security -12th International Conference, ICICS 2010, ser, vol.6476, pp.1-3, 2010.

A. Pfitzmann and M. Köhntopp, Anonymity, Unobservability, and Pseudonymity -A Proposal for Terminology, International Workshop on Design Issues in Anonymity and Unobservability, ser, pp.1-9, 2000.

R. Motwani and P. Raghavan, Randomized Algorithms, 1995.

W. Feller, An Introduction to Probability Theory and Its Applications, vol.1, 1968.

G. Ercal-ozkaya, Routing in Random Ad-Hoc Networkds: Provably Better than Worst-case, 2008.

A. Serjantov and G. Danezis, Towards an Information Theoretic Metric for Anonymity, Privacy Enhancing Technologies, Second International Workshop, PET 2002, ser, vol.2482, pp.41-53, 2002.
DOI : 10.1007/3-540-36467-6_4

J. Yao and W. Mao, RFC 6531 (Proposed Standard), Internet Engineering Task Force, 2012.

P. Mockapetris, Domain names -Implementation and Specification, RFC 1035 (INTERNET STANDARD), 1987.
DOI : 10.17487/rfc1035

URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc1035.txt.pdf

. The-radicati-group and . Inc, Email Statistics Report, 2015.

J. Steube, Hashcat Advanced Password Recovery, 2016.

B. H. Bloom, Space/Time Trade-offs in Hash Coding with Allowable Errors, Commun. ACM, vol.13, issue.7, pp.422-426, 1970.
DOI : 10.1145/362686.362692

. The, . Party, . The, . Of, . With et al., Opinion 01/2017 on the Proposed Regulation for the ePrivacy Regulation, 2017.

J. P. Achara, M. Cunche, V. Roca, and A. Francillon, Short Paper: WifiLeaks: Underestimated Privacy Implications of the access_wifi_state Android Permission, Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, pp.231-236, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00997716

A. Musa and J. Eriksson, Tracking Unmodified Smartphones Using WiFi Monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, pp.281-294, 2012.
DOI : 10.1145/2426656.2426685

URL : http://www.cs.uic.edu/~jakob/papers/musa-sensys12.pdf

B. Fung, How stores use your phone's WiFi to track your shopping habits, 2013.

A. Farshidi, The New Retail Experience and Its Unaddressed Privacy Concerns: How RFID and Mobile Location Analytics are Collecting Customer Information, Technology, & the Internet, vol.7, issue.1, p.15, 2016.

I. Ieee, , 2015.

. Yandex, Yandex Safe Browsing, 2015.

T. Berners-lee, R. Fielding, and L. Masinter, Uniform Resource Identifier (URI): Generic Syntax, vol.7320, 2005.
DOI : 10.17487/rfc3986

URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc3986.txt.pdf

T. Berners-lee, L. Masinter, and M. Mccahill, Uniform Resource Locators (URL), 1994.
DOI : 10.17487/rfc1738

G. Inc, , 2008.

, Alexa 1M Global Sites, BigBlackList, 2015.

Z. Security and C. , , 2015.

&. Dns-census, Online, 2013.

C. Percival and S. Josefsson, The scrypt Password-Based Key Derivation Function, RFC, vol.7914, 2016.

N. Provos and D. Mazières, A Future-Adaptable Password Scheme, Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference, pp.81-91, 1999.

G. Cormode and S. Muthukrishnan, An Improved Data Stream Summary: The Count-Min Sketch and Its Applications, J. Algorithms, vol.55, issue.1, pp.58-75, 2005.

A. Gervais, S. Capkun, G. O. Karame, and D. Gruber, On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients, Annual Computer Security Applications Conference, ACSAC 2014, pp.326-335, 2014.

Ú. Erlingsson, V. Pihur, and A. Korolova, RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014.

M. Alaggan, S. Gambs, and A. Kermarrec, BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom filters, Stabilization, Safety, and Security of Distributed Systems -14th International Symposium, pp.202-216, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00724829

C. Dwork, Differential Privacy, 33rd International Colloquium on Automata, Languages and Programming, part II (ICALP 2006), ser. Lecture Notes in Computer Science, vol.4052, pp.1-12, 2006.